Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    92s
  • max time network
    113s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/02/2023, 13:03

General

  • Target

    2fffb9e3cef7f3b779884b4d690137c10b266b56.exe

  • Size

    34KB

  • MD5

    b28805a91c77bd56fb47307477c522f8

  • SHA1

    2fffb9e3cef7f3b779884b4d690137c10b266b56

  • SHA256

    aa4046ab8b9a2566c1a35d827ed97ce8f15e0254727d270807505f47d53aaeff

  • SHA512

    c2b602132cd28cdae70d9e03609b23d27f90eb094857caeb0740b56196ae28bbd9982f864f81e145b362a4fea2379e18f21b3f94cd529363ea4a2a536eadad51

  • SSDEEP

    384:kOhNuCCfNNrQKvPWXwEwZhI6hlhxggKWJUw34KljAAlGOBN3z7E7H96vEPnKvFU8:kOWNrrWXnohVxKWaihMbKW+k2RH

Score
7/10

Malware Config

Signatures

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2fffb9e3cef7f3b779884b4d690137c10b266b56.exe
    "C:\Users\Admin\AppData\Local\Temp\2fffb9e3cef7f3b779884b4d690137c10b266b56.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4908
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"
      2⤵
        PID:3932
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"
        2⤵
          PID:4212
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"
          2⤵
            PID:4288
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"
            2⤵
              PID:4268
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe"
              2⤵
                PID:5044
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"
                2⤵
                  PID:2692
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"
                  2⤵
                    PID:3372
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe
                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe"
                    2⤵
                      PID:1088
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe
                      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"
                      2⤵
                        PID:2736
                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"
                        2⤵
                          PID:808
                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"
                          2⤵
                            PID:4272
                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"
                            2⤵
                              PID:4724
                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe
                              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"
                              2⤵
                                PID:5020
                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe
                                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"
                                2⤵
                                  PID:1200
                                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe
                                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"
                                  2⤵
                                    PID:1192
                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe
                                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"
                                    2⤵
                                      PID:1100
                                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                                      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"
                                      2⤵
                                        PID:3068
                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe
                                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"
                                        2⤵
                                          PID:1488
                                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe
                                          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"
                                          2⤵
                                            PID:1460
                                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                                            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
                                            2⤵
                                              PID:1456
                                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
                                              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"
                                              2⤵
                                                PID:1896
                                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe
                                                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"
                                                2⤵
                                                  PID:1800
                                                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe
                                                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"
                                                  2⤵
                                                    PID:2856
                                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe
                                                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"
                                                    2⤵
                                                    • Accesses Microsoft Outlook profiles
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    • outlook_office_path
                                                    • outlook_win_path
                                                    PID:1716

                                                Network

                                                MITRE ATT&CK Enterprise v6

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • memory/1716-134-0x0000000000400000-0x0000000000430000-memory.dmp

                                                  Filesize

                                                  192KB

                                                • memory/1716-137-0x0000000005D20000-0x00000000062C4000-memory.dmp

                                                  Filesize

                                                  5.6MB

                                                • memory/1716-138-0x0000000005770000-0x00000000057D6000-memory.dmp

                                                  Filesize

                                                  408KB

                                                • memory/1716-139-0x0000000006870000-0x0000000006902000-memory.dmp

                                                  Filesize

                                                  584KB

                                                • memory/1716-140-0x0000000006850000-0x000000000685A000-memory.dmp

                                                  Filesize

                                                  40KB

                                                • memory/1716-141-0x0000000006970000-0x00000000069C0000-memory.dmp

                                                  Filesize

                                                  320KB

                                                • memory/1716-142-0x0000000006C90000-0x0000000006E52000-memory.dmp

                                                  Filesize

                                                  1.8MB

                                                • memory/4908-132-0x0000021CE4810000-0x0000021CE481E000-memory.dmp

                                                  Filesize

                                                  56KB

                                                • memory/4908-133-0x00007FFB8E480000-0x00007FFB8EF41000-memory.dmp

                                                  Filesize

                                                  10.8MB

                                                • memory/4908-136-0x00007FFB8E480000-0x00007FFB8EF41000-memory.dmp

                                                  Filesize

                                                  10.8MB